Access Patterns in LSM Trees | Dark Hacker News